نتایج جستجو برای: authorization
تعداد نتایج: 8242 فیلتر نتایج به سال:
Prior Authorization Information Pre-service approval is required for all inpatient services for all products. See below for situations where prior authorization may be required or may not be required for outpatient services. Yes indicates that prior authorization is required. No indicates that prior authorization is not required. N/A indicates that this service is primarily performed in an inpa...
We present the design of a distributed authorization service which parallels existing authentication services for distributed systems. Such a service would operate on top of an authentication substrate. There are two distinct ideas underlying our design: (1) The use of a language, called generalized access control list (GACL), as a common representation of authorization requirements. (2) The us...
Experts in criticism and amendment have criticized some narrators of hadith because of some attributes, special moral traits or particular convictions. Belief in exaggeration and authorization is one of the factors which the narrators in earlier sources of transmitters of hadith have considered blameworthy. This phenomenon was widespread among the transmitters of the hadith of the Imams in th...
Experts in criticism and amendment have criticized some narrators of hadith because of some attributes, special moral traits or particular convictions. Belief in exaggeration and authorization is one of the factors which the narrators in earlier sources of transmitters of hadith have considered blameworthy. This phenomenon was widespread among the transmitters of the hadith of the Imams in th...
While there has been considerable eeort in creating a single sign-on solution for interoperability among au-thentication methods, such interoperability across authorization methods has received little attention. This paper presents a exible distributed authorization protocol that provides the full generality of restricted proxies while supporting the functionality of and interop-erability with ...
In this paper, we propose a methodology for incremental security policy specification at varying levels of abstraction while maintaining strict equivalence with respect to authorization state. We specifically consider the recently proposed group-centric secure information sharing (g-SIS) domain. The current specification for g-SIS authorization policy is stateless in the sense that it solely fo...
Proxy authorization makes it possible to entrust the right of signing or making decisions to other parties. This paper analyzes the basic principles and security problems of proxy authorization schemes and presents three proxy authorization schemes based on elliptic curves cryptosystem. In the first multiparty proxy authorization scheme, a group of n members can cooperate to entrust their right...
In this paper, we propose a methodology for incremental security policy specification at varying levels of abstraction while maintaining strict equivalence with respect to authorization state. We specifically consider the recently proposed group-centric secure information sharing (g-SIS) domain. The current specification for g-SIS authorization policy is stateless in the sense that it solely fo...
This document defines support for the Authorization Identity Request Control and the Authorization Identity Response Control for requesting and returning the authorization established in a bind operation. The Authorization Identity Request Control may be submitted by a client in a bind request if authenticating with version 3 of the Lightweight Directory Access Protocol (LDAP) protocol [LDAPv3]...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید